Nytro Posted June 13, 2012 Report Posted June 13, 2012 The UltimateGuide to SocialEngineeringFrom CSO Magazine and CSOonline.comContentsI. DefinitionWhat is social engineering?What social engineers wantHow social engineers workII. Basic TacticsWhy people fall for socialengineering and other scamsIII. PreventionIV. Social Engineersin Action“Pickup lines” commonly usedLots of true stories and examplesI. DefinitionWhat is Social Engineering?Social engineering is the art of gaining access to buildings,systems or data by exploiting human psychology, ratherthan by breaking in or using technical hacking techniques.For example, instead of trying to find a software vulnerability,a social engineer might call an employee and pose as anIT support person, trying to trick the employee into divulginghis password. The goal is always to gain the trust of oneor more of your employees.Famous hacker Kevin Mitnick helped popularize theterm “social engineering” in the ‘90s, but the simple ideaitself (tricking someone into doing something or divulgingsensitive information) has been around for ages.What Social Engineers WantThe goal for many social engineers is to obtain personalinformation that can either directly lead them to financialor identity theft or prepare them for a more targetedattack. They also look for ways to install malware that givesthem better access to personal data, computer systems oraccounts, themselves. In other cases, social engineers arelooking for information that leads to competitive advantage.Items that scammers find valuable include the following:NN PasswordsNNAccount numbersNNKeysNNAny personal informationNNAccess cards and identity badgesNN Phone listsNNDetails of your computer systemNNThe name of someone with access privilegesNN Information about servers, networks, non-public URLs,intranetDownload:http://assets.csoonline.com/documents/cache/pdfs/Social-Engineering-Ultimate-Guide.pdf Quote